Vulnerability Details : CVE-2007-5045
Argument injection vulnerability in Apple QuickTime 7.1.5 and earlier, when running on systems with Mozilla Firefox before 2.0.0.7 installed, allows remote attackers to execute arbitrary commands via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter containing the Firefox "-chrome" argument. NOTE: this is a related issue to CVE-2006-4965 and the result of an incomplete fix for CVE-2007-3670.
Exploit prediction scoring system (EPSS) score for CVE-2007-5045
Probability of exploitation activity in the next 30 days: 1.93%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 88 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-5045
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-5045
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-5045
-
Red Hat 2007-10-04Not vulnerable. These issues did not affect the versions of Firefox as shipped with Red Hat Enterprise Linux.
- http://www.securityfocus.com/archive/1/479179/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5896
- http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
- http://www.novell.com/linux/security/advisories/2007_57_mozilla.html
-
https://bugzilla.mozilla.org/show_bug.cgi?id=395942
-
http://www.mozilla.org/security/announce/2007/mfsa2007-28.html
Patch
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
-
http://www.vupen.com/english/advisories/2007/3197
- cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*